Gray hat hacking : the ethical hacker's handbook 的封面图片
Gray hat hacking : the ethical hacker's handbook
題名:
Gray hat hacking : the ethical hacker's handbook
著者:
Regalado, Daniel.
ISBN(國際標準書號):
9780071832380
版本:
Fourth edition.
出版資訊:
New York : McGraw-Hill Education, c2015.
規格:
xxix, 625 p. : ill. ; 24 cm
摘要:
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.

Part 1. Crash course : preparing for the war. Ethical hacking and the legal system -- Programming survival skills -- Static analysis -- Advanced analysis with IDA Pro -- World of fuzzing -- Shellcode strategies -- Writing Linux shellcode -- Part 2. From vulnerability to exploit. Spoofing-based attacks -- Exploiting Cisco routers -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Bypassing Windows memory protections -- Exploiting the Windows Access Control model -- Exploiting web applications -- Exploiting IE : smashing the heap -- Exploiting IE : use-after-free technique -- Advanced client-side exploitation with BeEF -- One-day exploitation with patch diffing -- Part 3. Advanced malware analysis. Dissecting Androis malware -- Dissecting ransomware -- Analyzing 64-bit malware -- Next-generation reverse engineering.
主題:
Computer security.
Hackers.
摘要:
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.

Part 1. Crash course : preparing for the war. Ethical hacking and the legal system -- Programming survival skills -- Static analysis -- Advanced analysis with IDA Pro -- World of fuzzing -- Shellcode strategies -- Writing Linux shellcode -- Part 2. From vulnerability to exploit. Spoofing-based attacks -- Exploiting Cisco routers -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Bypassing Windows memory protections -- Exploiting the Windows Access Control model -- Exploiting web applications -- Exploiting IE : smashing the heap -- Exploiting IE : use-after-free technique -- Advanced client-side exploitation with BeEF -- One-day exploitation with patch diffing -- Part 3. Advanced malware analysis. Dissecting Androis malware -- Dissecting ransomware -- Analyzing 64-bit malware -- Next-generation reverse engineering.